Security Awareness Training Blog

Social Engineering Blog

Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.

More_eggs Malware Distributed Via Spear Phishing

Threat actors are sending out the stealthy “more_eggs” malware in spear phishing emails that target hiring managers, according to researchers at eSentire’s Threat Response Unit (TRU).
Continue Reading

Community Associations Confront Social Engineering

It’s not just deep-pocketed corporations that prove attractive targets for social engineering. Any organization that holds information that can fetch a good price in the criminal ...
Continue Reading

LinkedIn is the Most Impersonated Brand in Phishing Attacks

Social media companies, particularly LinkedIn, are now the most impersonated brands in phishing campaigns, researchers at Check Point have found.
Continue Reading

TraderTraitor: When States do Social Engineering

North Korea’s Lazarus Group is using social engineering attacks to target users of cryptocurrency, according to a joint advisory from the US FBI, the Cybersecurity and Infrastructure ...
Continue Reading

FBI Warns of Bank Fraud Smishing Campaign

The FBI has warned of a smishing campaign that’s targeting people in the US with phony bank fraud notifications. The text messages inform users that someone has attempted to initiate a ...
Continue Reading

Social Engineering Campaign against African Banks

A phishing campaign is targeting African banks with a technique called “HTML smuggling” to bypass security filters, according to threat researchers at HP.
Continue Reading

“Being Annoying” as a Social Engineering Approach

Attackers are spamming multifactor authentication (MFA) prompts in an attempt to irritate users into approving the login, Ars Technica reports. Both criminal and nation-state actors are ...
Continue Reading

Meta Stops Three Cyber Espionage Groups Targeting Critical Industries

Impersonating legitimate companies and using a complex mix of fake personas across Facebook, Telegram, and other platforms, these groups used social engineering to gain network access.
Continue Reading

Social Engineering from Tehran

Social engineering continues to be a core component of the Iranian government’s hacking operations, according to researchers at Recorded Future.
Continue Reading

Social Engineering by "Emergency Data Request"

Bloomberg has reported that forged "Emergency Data Requests" last year induced Apple and Meta to surrender "basic subscriber details, such as a customer’s address, phone number and IP ...
Continue Reading

Cisco: Web 3.0 Will be the Next Frontier for Social Engineering and Phishing Attacks

A look at what makes up Web 3.0 and how it may be used includes insight into what kinds of cyberattacks may plague it, as cybercriminals look for new profitable opportunities.
Continue Reading

Cost of Internet Crimes in 2021 Increase 64% Exceeding $6.9 Billion

New data from the FBI’s Internet Crime Complaint Center (IC3) shows a massive increase in the cost of internet crimes, with phishing and BEC topping the list.
Continue Reading

FBI Warns of Phishing Attacks Targeting Election Officials

The FBI has issued a Private Industry Notification warning of phishing emails designed to steal login credentials from election officials. The Bureau believes these attacks will increase ...
Continue Reading

Mobile Device Usage Have Led to Security Incidents in Nearly Half of Organizations

The shift in devices used by today’s workforce has resulted in increases in cybersecurity concerns and incidents, despite a majority of orgs with defined BYOD programs in place.
Continue Reading

Email Conversation Hacking to Distribute Malware

Researchers at Intezer warn that attackers are hijacking email conversations to distribute the IcedID banking Trojan. This technique makes the phishing emails appear more legitimate and ...
Continue Reading

Making Better Push-Based MFA

I used to be a huge fan of Push-Based Multifactor Authentication (MFA), but real-world use has shown that most of today’s most popular implementations are not sufficiently protective ...
Continue Reading

Buy Now, Pay Later Scams

Fraudsters are taking advantage of the buy-now, pay-later (BNPL) payment model, according to Jim Ducharme, COO of Outseer. On the CyberWire’s Hacking Humans podcast, Ducharme explained ...
Continue Reading

Initial Access Broker Group Relies on Social Engineering

Google’s Threat Analysis Group (TAG) describes a cybercriminal group it calls “EXOTIC LILY” that acts as an initial access broker for numerous financially motivated threat actors, ...
Continue Reading

Number of Phishing Attacks Hits an All-Time High in 2021, Tripling That of Early 2020

New data from the Anti-Phishing Working Group shows cybercriminals are stepping on the gas, focusing phishing attacks on credential theft and response-based scams.
Continue Reading

Published Zelenskyy Deepfake Video Demonstrates the Modern War is Online

The video uploaded to a hacked Ukrainian news website shows how far the technology has come, how it can be used in social engineering, as well as how the tech still needs to improve.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews